Return-Path: <sentto-279987-1565-997327930-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Wed, 08 Aug 2001 20:34:17 -0700 (PDT) Received: (qmail 5506 invoked by uid 510); 9 Aug 2001 02:34:34 -0000 Received: from n15.groups.yahoo.com (216.115.96.65) by 204.181.12.215 with SMTP; 9 Aug 2001 02:34:34 -0000 X-eGroups-Return: sentto-279987-1565-997327930-fc=all.net@returns.onelist.com Received: from [10.1.4.52] by ml.egroups.com with NNFMP; 09 Aug 2001 03:32:10 -0000 X-Sender: fc@big.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-7_3_1); 9 Aug 2001 03:32:10 -0000 Received: (qmail 42136 invoked from network); 9 Aug 2001 03:32:09 -0000 Received: from unknown (10.1.10.142) by m8.onelist.org with QMQP; 9 Aug 2001 03:32:09 -0000 Received: from unknown (HELO big.all.net) (65.0.156.78) by mta3 with SMTP; 9 Aug 2001 03:32:09 -0000 Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id UAA10601 for iwar@onelist.com; Wed, 8 Aug 2001 20:32:08 -0700 Message-Id: <200108090332.UAA10601@big.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL1] From: Fred Cohen <fc@all.net> Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Wed, 8 Aug 2001 20:32:08 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] [NewsBits] NewsBits - 08/06/01 (fwd) Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit August 6, 2001 New Code Red: Worse than the first? A new and possibly more virulent version of the "Code Red" computer worm was detected circulating the Internet over the weekend, attacking machines and leaving them vulnerable to other intruders, a leading Internet security site reported. The Systems Administration, Networking and Security Institute (SANS) said in an advisory on its Web site that the latest variant of the computer virus seems to leave a "back door" in infected systems that makes them easy for an intruder to infiltrate. Code Red surreptitiously infects computers running Microsoft's Windows NT or 2000 operating systems and its IIS Web server software and then makes infected machines scan the Internet for more victims. http://www.zdnet.com/zdnn/stories/news/0,4586,5095232,00.html http://www.internetnews.com/wd-news/article/0,,10_860451,00.html http://www.techtv.com/news/hackingandsecurity/story/0,24195,3340712,00.html Microsoft server flaw has businesses on edge http://news.cnet.com/news/0-1003-201-6741564-0.html `Code Red II' worm reported on Internet http://www.siliconvalley.com/docs/news/tech/020008.htm New, more damaging server worm reported http://www.siliconvalley.com/docs/news/tech/067421.htm Flawed patches threaten systems, say IT managers http://news.zdnet.co.uk/story/0,,t269-s2092607,00.html Code Red II: A double whammy http://www.zdnet.com/zdnn/stories/news/0,4586,5095260,00.html http://www.zdnet.com/zdhelp/stories/main/0,5594,2800311,00.html Code Red and the Risk of Crying Wolf http://www.siliconvalley.com/docs/news/reuters_wire/1391138l.htm http://www.usatoday.com/life/cyber/tech/2001-08-06-code-red-cry-wolf.htm Britain issues alert over new computer worm http://www.siliconvalley.com/docs/news/reuters_wire/1389563l.htm Code Red Copycat Worm Packs A Malicious Punch http://www.newsbytes.com/news/01/168693.html http://www.msnbc.com/news/606910.asp Son-of-Code-Red brings new risk to vulnerable servers http://www.gcn.com/vol1_no1/daily-updates/16751-1.html New 'Code Red' worm entices Web hijackers http://www.cnn.com/2001/TECH/internet/08/06/code.red.two/index.html Code Red II Wends Its Way http://www.wired.com/news/technology/0,1282,45847,00.html Dangerous 'Sircam' virus keeps spreading While the "Code Red" Internet worm grabs headlines and alarms Internet users around the world, a different virus has been quietly wreaking havoc in the background, infecting computers and sending out potentially sensitive files, security experts said on Thursday. The virus, dubbed "Sircam," is responsible for secret documents being leaked from the administration of Ukrainian President Leonid Kuchma this week to the ForUm news Web site operators said. A computer at the FBI's National Infrastructure Protection Center became infected with the virus late last month and sent some private, though not sensitive or classified, FBI documents out in e-mails as a result, officials said. http://www.usatoday.com/life/cyber/tech/2001-08-03-sircam-spreads.htm Groups call proposed cybersecurity bill a 'smokescreen' Consumer protection and privacy groups are raising opposition to elements of a draft computer security bill that Republican Sens. Robert Bennett of Utah and Jon Kyl of Arizona had planned to introduce Thursday but postponed until September to woo more cosponsors. The draft legislation, which provides businesses with exemptions from the Freedom of Information Act (FOIA), antitrust prosecution, and lawsuits that could stem from the disclosure of cybersecurity information, parallels many provisions in a bill, H.R. 2435, introduced by Virginia Reps. Tom Davis, a Republican, and James Moran, a Democrat. http://www.govexec.com/dailyfed/0801/080301td.htm Microsoft Passport Security Flaws Now On The Radar A scathing critique of an e-commerce service from Microsoft is suddenly causing a buzz among computer security enthusiasts -- more than a year after it was published. Microsoft's Passport service, in use today at dozens of online merchants, "carries significant risks to users" according to researchers at AT&T Labs, who concluded that until fundamental changes are made to the single sign-in and electronic wallet service, "efforts such as Passport must be viewed with suspicion." http://www.newsbytes.com/news/01/168725.html FBI's Kerr Tapped as CIA's Gizmo Chief Donald Kerr will oversee the department that develops spy gizmos, tools, and technologies. The CIA has hired a G-man as its new Q. Donald Kerr, as the agency's new deputy director for science and technology, will oversee the department that develops spy gizmos, tools, and technologies, much as the character named Q did for the British Secret Service in the James Bond films. That department in past decades developed the U-2 spy plane, created such tools as cameras hidden in the fabric of handbags, and hollowed out everyday items to hide secret documents or film. http://www.techtv.com/news/politicsandlaw/story/0,24195,3340741,00.html IT security must consider internal threats Security experts have warned that many firms are still failing to consider internal threats when establishing security policies Research shows more security breaches come from inside enterprises than outside. Fewer than 10 percent of break-ins to IT systems come from external hackers, according to a survey by security specialist NSC Technology. "Despite this, many chief information officers believe a firewall is enough to stop attacks," said NSC security consultant Gerard Doyle. http://news.zdnet.co.uk/story/0,,t269-s2092635,00.html ------------------------ Yahoo! Groups Sponsor ---------------------~--> Secure your servers with 128-bit SSL encryption! Grab your copy of VeriSign's FREE Guide: "Securing Your Web Site for Business." Get it Now! http://us.click.yahoo.com/n7RbFC/zhwCAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-09-29 21:08:39 PDT